Sciweavers

1502 search results - page 252 / 301
» The new face of war
Sort
View
DIM
2009
ACM
14 years 2 months ago
Privacy-aware identity management for client-side mashup applications
This paper concerns the problem of identity management in modern Web-2.0-based mashup applications. Identity management supports convenient access to information when mashups are ...
Saman Zarandioon, Danfeng Yao, Vinod Ganapathy
VLSID
2008
IEEE
191views VLSI» more  VLSID 2008»
14 years 2 months ago
Programming and Performance Modelling of Automotive ECU Networks
The last decade has seen a phenomenal increase in the use of electronic components in automotive systems, resulting in the replacement of purely mechanical or hydraulic-implementa...
Samarjit Chakraborty, Sethu Ramesh
ACNS
2008
Springer
94views Cryptology» more  ACNS 2008»
14 years 2 months ago
Restricted Queries over an Encrypted Index with Applications to Regulatory Compliance
Compliance storage is an increasingly important area for businesses faced with a myriad of new document retention regulations. Today, businesses have turned to Write-One Read Many ...
Nikita Borisov, Soumyadeb Mitra
HICSS
2007
IEEE
141views Biometrics» more  HICSS 2007»
14 years 2 months ago
Modular Integration Through Aspects: Making Cents of Legacy Systems
Recently, Continua Health Alliance has brought together a powerhouse team, including Cisco, IBM, Motorola and others, for personal telehealth products and services. This team will...
Celina Gibbs, Daniel Lohmann, Chunjian Robin Liu, ...
ISVD
2007
IEEE
14 years 2 months ago
Two-dimensional line space Voronoi Diagram
Given a set of points called sites, the Voronoi diagram is a partition of the plane into sets of points having the same closest site. Several generalizations of the Voronoi diagra...
Stéphane Rivière, Dominique Schmitt